Davide Balzarotti (@balzarot) 's Twitter Profile
Davide Balzarotti

@balzarot

Professor in Computer Security @EURECOM.
Ex Defcon CTF organizer with @oooverflow

ID: 236534704

linkhttp://s3.eurecom.fr/~balzarot/ calendar_today10-01-2011 20:24:01

1,1K Tweet

2,2K Followers

317 Following

tylerni7 (@tylerni7) 's Twitter Profile Photo

Ah yes, the rare annual east-west migration of the iPhones from their birth place of Shenzen to the Americas. Nature is beautiful

Davide Balzarotti (@balzarot) 's Twitter Profile Photo

Note to self: when a twitter account is hacked, remember *not* to go and unfollow it while sitting in the living room in front of your family :O

Marcel Böhme👨‍🔬 (@mboehme_) 's Twitter Profile Photo

Very lucky to receive the ERC Consolidator this year! This is 5-year funding for groundbreaking research. If you are interested in our perspective on software security analysis at scale, stick around and read on. European Research Council (ERC) #ERCCoG #MPI_SP CASA - Cluster of Excellence for Cyber Security mpi-sp.org/71953/news_pub…

Zardus@DEFCON.social (@zardus) 's Twitter Profile Photo

Hello aspiring cybersecurity professors! ASU is hiring faculty in all security disciplines and all levels, and the first deadline is TONIGHT! Apply at apply.interfolio.com/157461 and don't worry --- you can still apply tomorrow if tonight is impossible :-)

Adam Doupé (@adamdoupe) 's Twitter Profile Photo

Proud to announce the first-ever ACSAC Capture the Flag (CTF)! Celebrating 40 years of ACSAC, we honor the Hawaiian culture inspired by the legend of Māui, who used the Manaiakalani to fish the Hawaiian Islands out of the ocean Attendees play @ acsacctf.com

Proud to announce the first-ever <a href="/ACSAC_Conf/">ACSAC</a> Capture the Flag (CTF)!

Celebrating 40 years of ACSAC, we honor the Hawaiian culture inspired by the legend of Māui, who used the Manaiakalani to fish the Hawaiian Islands out of the ocean

Attendees play @ acsacctf.com
cts🌸 (@gf_256) 's Twitter Profile Photo

New attack on x86 secure enclaves, specifically AMD SEV this time. SEV is AMD's answer to Intel TDXs. Basically tricking the CPU into thinking the DRAM is a different size, causing physical address aliasing, which can then be exploited

New attack on x86 secure enclaves, specifically AMD SEV this time. SEV is AMD's answer to Intel TDXs. 

Basically tricking the CPU into thinking the DRAM is a different size, causing physical address aliasing, which can then be exploited
Simone Aonzo (@packm4d) 's Twitter Profile Photo

Huge party at Eurecom today! We're celebrating the acceptance of "The Dark Side of Native Code on Android" at ACM TOPS after just 2 years and 3 months! Even if the dataset is outdated... The name of our tool, ANDani is worth reading it. techrxiv.org/doi/full/10.36…

Huge party at Eurecom today! We're celebrating the acceptance of "The Dark Side of Native Code on Android" at ACM TOPS after just 2 years and 3 months!

Even if the dataset is outdated... The name of our tool, ANDani is worth reading it.

techrxiv.org/doi/full/10.36…
Andrea Oliveri (@iridiumxor) 's Twitter Profile Photo

You want to dump the physical memory of a Linux system but can't load a kernel driver or use /proc/kcore? Try Lemon, a CO-RE eBPF program that dumps the entire physical memory in LiME format. Developed by Sudharsun Lakshmi Narasimhan and me at s3eurecom github.com/eurecom-s3/lem…

Moose (@litmoose) 's Twitter Profile Photo

Back in my day, you either made your own bespoke, artisanal backdoor, or you spent your every waking hour finding one that the company claimed surely didn't exist. Asking a company for vuln handouts?! Have you all no shame?! ft.com/content/f0b812…

Tib3rius (@0xtib3rius) 's Twitter Profile Photo

BREAKING. From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.

BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
Davide Balzarotti (@balzarot) 's Twitter Profile Photo

Everyone is worried about AI impersonating humans. Do we have a name for humans impersonating AI? "AI unicorn just collapsed as it turns out their 'AI backend' was just Indian developers pretending to write code" unilad.com/technology/new…

Davide Balzarotti (@balzarot) 's Twitter Profile Photo

Book on machine learning is full of made-up citations. Soon we'll start having school books with hallucinated facts/explanations. retractionwatch.com/2025/06/30/spr…

Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1995: After writing the initial version of the yet-to-be-released SSH, Tatu Ylonen emailed a request to IANA for SSH to be assigned port 22, receiving approval and assignment mere hours later. Yes, people of 2025, 30 years ago that's how things got done!

1995: After writing the initial version of the yet-to-be-released SSH, Tatu Ylonen emailed a request to IANA for SSH to be assigned port 22, receiving approval and assignment mere hours later. Yes, people of 2025, 30 years ago that's how things got done!